{"id":7382,"date":"2014-04-14T12:13:06","date_gmt":"2014-04-14T16:13:06","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7382"},"modified":"2014-04-14T12:13:06","modified_gmt":"2014-04-14T16:13:06","slug":"u-s-government-to-tell-how-they-used-exploits-except","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/u-s-government-to-tell-how-they-used-exploits-except\/","title":{"rendered":"U.S. Government to Tell How They Used Exploits &hellip;Except&hellip;"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; display: inline\" src=\"http:\/\/tctechcrunch2011.files.wordpress.com\/2014\/04\/heartbleed2.jpg?w=400\" align=\"left\"\/>Heartbleed kicked off a <a href=\"http:\/\/techcrunch.com\/2014\/04\/07\/massive-security-bug-in-openssl-could-effect-a-huge-chunk-of-the-internet\/\">new chapter<\/a> in the rollicking discussion of privacy, digital security, and the role of government in protecting its citizenry from threats both real and imagined. <\/p>\n<p>News of Heartbleed <a href=\"http:\/\/techcrunch.com\/2014\/04\/08\/openssl-heartbleed-bug-leaves-much-of-the-internet-at-risk\/\">broke early last week<\/a>, starting a soul-searching bit of Internet-scrambling by services large and small to examine their own networks and products to see if they were exposed to the flaw. Much work remains for those impacted to get their services air-tight and patched, with certificates and revoked and replaced. It\u2019s no small task, and one <a href=\"http:\/\/news.netcraft.com\/archives\/2014\/04\/11\/heartbleed-certificate-revocation-tsunami-yet-to-arrive.html\">that isn\u2019t nearly done<\/a>. <\/p>\n<p>Friday <a href=\"http:\/\/www.bloomberg.com\/news\/2014-04-11\/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html\">brought allegations<\/a> that the NSA not only knew of Heartbleed, but had used the exploit for some time, perhaps two years. The NSA, in a statement, <a href=\"http:\/\/techcrunch.com\/2014\/04\/11\/nsa-exploited-heartbleed-for-years\/\">denied this<\/a>. The White House followed suit. Since then we\u2019ve learned a few things that are worth keeping in mind. <\/p>\n<p>Let\u2019s begin with what the U.S. government\u2019s policy is regarding revealing flaws in Internet security. The New York Times <a href=\"http:\/\/www.nytimes.com\/2014\/04\/13\/us\/politics\/after-heartbleed-bug-obama-decides-us-should-reveal-internet-security-flaws.html?hp\">wrote the key report on this<\/a>, based on sourcing from \u201csenior administration officials.\u201d The gist here is that the U.S. government now claims to have a bent towards disclosing what flaws it does find, provided, as quoted by The Times, there is a \u201ca clear national security or law enforcement need.\u201d&nbsp; <\/p>\n<p><a href=\"http:\/\/goo.gl\/tMCEyn\" target=\"_blank\"><strong><u>Read the entire article on Techcrunch<\/u><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Heartbleed kicked off a new chapter in the rollicking discussion of privacy, digital security, and the role of government in protecting its citizenry from threats both real and imagined. News of Heartbleed broke early last week, starting a soul-searching bit of Internet-scrambling by services large and small to examine their own networks and products to see if they\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/u-s-government-to-tell-how-they-used-exploits-except\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7382"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7382"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7382\/revisions"}],"predecessor-version":[{"id":7383,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7382\/revisions\/7383"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}